1. Introduction/1. Teaser - Converting Downloads To Trojans On The Fly & Hacking Windows 10.mp421.98MB
1. Introduction/2. Course Overview.mp421.05MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/1. MITMproxy - What is It & How To Install It.mp47.79MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/10. [Bonus] - Hacking Windows 10 Using A Fake Update.mp411.62MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/2. Using MITMproxy In Explicit Mode.mp411.41MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/3. Analysing (Filtering & Highlighting) Flows.mp411.77MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/4. Intercepting Network Flows.mp49.93MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/5. Modifying Responses & Injecting Javascript Manually.mp422.94MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/6. Intercepting & Modifying Responses In Transparent Mode.mp416.2MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/7. Editing Responses & Injecting BeEF's Code On The Fly.mp422.97MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/8. Editing Responses Automatically Based On Regex.mp420.42MB
10. Post Connection Attacks - Analysing Data Flows & Running Custom Attacks/9. [Bonus] - Stealing Login Info Using Fake Login Prompt.mp419.09MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/1. What Do Mean By MITM Scripts.mp413.74MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/10. Executing Bash Commands & Calling Trojan Factory From Our Script.mp418.72MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/11. Using Variables & More Complex Conditions.mp416.95MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/12. Converting Downloads To Trojans On The Fly.mp423.17MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/13. Configuring The Trojan Factory's MITMproxy Script.mp416.45MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/14. Using The Trojan Factory MITMproxy Script.mp418.81MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/2. Capturing & Printing RequestsResponses.mp418.17MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/3. Filtering Flows & Extracting Useful Data.mp427.37MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/4. Using Conditions To Execute Code On Useful Flows.mp426.83MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/5. Generating Custom HTTP Responses.mp419.33MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/6. Testing Script Locally.mp418.27MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/7. Generating Trojans - Installing The Trojan Factory.mp415.87MB
11. Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks/8. Generating Trojans - Converting Any File (egimage) To a Trojan.mp424.27MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/1. Bypassing HTTPS With MITMproxy.mp416.32MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/2. Replacing Downloads From HTTPS.mp412.69MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/3. Injecting Data (Javascript, HTML elements ...etc) In HTTPS Websites.mp413.9MB
12. Post-Connection Attacks - Doing All Of The Above On HTTPS Websites/4. Securing Systems From The Above Post Connection Attacks.mp420.51MB
2. Back To BasicsPre-Connection Attacks/1. Pre-connection Attacks Overview.mp47.22MB
2. Back To BasicsPre-Connection Attacks/2. Spoofing Mac Address Manually.mp46.24MB
2. Back To BasicsPre-Connection Attacks/3. Targeting 5 GHz Networks.mp412.97MB
2. Back To BasicsPre-Connection Attacks/4. Deauthenticating a Client From Protected WiFi Networks.mp416.28MB
2. Back To BasicsPre-Connection Attacks/5. Deauthenticating Multiple Clients From Protected WiFi Networks.mp417.26MB
2. Back To BasicsPre-Connection Attacks/6. Deauthenticating All Clients From Protected WiFi Network.mp413.59MB